Patents Assigned to Service
-
Publication number: 20250171048Abstract: Autonomous vehicle systems provide improved safety in comparison to human driven vehicles by reducing crashes. However, in future scenarios, the autonomous vehicles have to share the road with human-driven vehicles. But human drivers make decision errors during maneuvers which lead to crashes. Autonomous vehicles therefore have to predict human-initiated safe and unsafe maneuvers to react appropriately for the safety and comfort of its passengers. The present disclosure addresses unresolved problems of the conventional autonomous vehicle systems by providing a stacked autoencoder based singular deep neural network that uses sensor data to predict if any vehicle within its field of view would perform safe or unsafe lane maneuvers into its headway or into any other vehicle's headway. The method of the present disclosure also helps surrounding vehicles to know intention of a target vehicle with the help of vehicle-to-vehicle communication systems in a road driving environment.Type: ApplicationFiled: September 30, 2024Publication date: May 29, 2025Applicant: Tata Consultancy Services LimitedInventors: Sruthi SATHY, Pandeeswari SANKARANARAYANAN, Arvind RAMANUJAM, Rajesh JAYAPRAKASH
-
Publication number: 20250169748Abstract: State of art techniques hardly address real-time detection of pain with sensor fusion approaches. A method and system herein provides intelligent sensor selection and fusion mechanism to detect the presence of pain and quantify pain level on edge devices in an effective and efficient manner, guided by information on pain origin, pathway and type extracted from input signals, without the requirement of any manual intervention or interference. The system provides an automation framework to accelerate the deployment of customized tiny models for wearable and edge devices, based on sensor availability and device compute capacity to create suitable model for the target device and task. The system takes accuracy, model size and latency as objectives, and sensor availability and computation resource constraints as targets for the automation framework enabling rapid generation and deployment of models on multiple edge devices (wearable devices), independent of the availability of a specific sensor.Type: ApplicationFiled: October 1, 2024Publication date: May 29, 2025Applicant: Tata Consultancy Services LimitedInventors: SHALINI MUKHOPADHYAY, ANIRUDDHA SINHA, SWARNAVA DEY, AVIK GHOSE
-
Publication number: 20250173484Abstract: Climate change has become a matter of concern due to increase in green-house gases (GHG) emissions. Agriculture is major contributor in GHG emissions. The present disclosure provides a system and method for estimation of dynamic adoption index and transition time for shifting to regenerative agriculture. The present disclosure utilizes knowledge graph-driven machine learning for GHG emissions forecasting from an agricultural land using a historical information associated with the agricultural land derived from remote sensing and on-field sensors. Further, a dynamic adoption index is estimated with knowledge-driven machine learning and data integration using data on forecasted GHG emissions, recommended agricultural practices and followed agricultural practices on the farm. Furthermore, a dynamic transition time required for shifting to regenerative agriculture is estimated with machine learning and context-sensitive modeling.Type: ApplicationFiled: October 23, 2024Publication date: May 29, 2025Applicant: Tata Consultancy Services LimitedInventors: JAYANTRAO MOHITE, SURYAKANT ASHOK SAWANT, ANKUR PANDIT, RAVINKUMAR SIVALINGAM, SRINIVASU PAPPULA
-
Publication number: 20250172253Abstract: A natural gas system includes a process suction conduit, a compressor package configured to receive a flow of natural gas from the process suction conduit and to increase a pressure of the flow of natural gas whereby the flow of natural gas is discharged from the compressor package as a pressurized flow of natural gas, a process discharge conduit connected downstream of the compressor package, and an emissions management module coupled to the compressor package and configured to capture emissions from the compressor package, wherein the emissions management module includes a vapor recovery unit configured to circulate the captured emissions from the VRU along an emissions discharge conduit coupled to the VRU to at least one of the process suction conduit, a fuel gas system of the natural gas system, and a hydrocarbon processing component of the natural gas system that is separate from the compressor package.Type: ApplicationFiled: December 9, 2024Publication date: May 29, 2025Applicant: Archrock Services, L.P.Inventors: Benjamin Castagnos, Tyler Davis, Benjamin Galassini, John H. Johnson, Evan Elie Judice, Michael Wasson, Walter E. Williams
-
Publication number: 20250175465Abstract: Methods and systems are described herein for authenticating user actions, while preventing social engineering attacks on the user. A request may be received for performing an action. The system may obtain, based on a plurality of parameters, a plurality of natural language representations of the action and prompt the user, on the user's mobile device, to describe what the user is attempting to do. The system may then use a machine learning model to determine whether the requested action matches the user's response. Based on determining that the natural language response matches a natural language representation, the system may generate a communication indicating that the action has been authenticated.Type: ApplicationFiled: November 27, 2023Publication date: May 29, 2025Applicant: Capital One Services, LLCInventors: Erik NEIGHBOUR, Lea CODY
-
Publication number: 20250169783Abstract: Conventionally, invasive techniques are used to localize Atrial Fibrillation sources, but they are inconvenient, technically complex, and expensive. Non-invasive methods such as ECGI are prone to errors due to small volume and wall thickness of the atria. Thus, embodiments of present disclosure provide a method and system for source localization of AF utilizing a modified dominant frequency approach and atrium depolarization time. The method initially obtains heart and torso scan images and extracts atrial and torso meshes from them. Then, Body Surface Potential (BSP) signals are sampled from the atrial meshes and torso meshes. Cardiac potential is reconstructed from BSP. Further, AF-DF probability and probable rotor regions are determined from the cardiac potential. AF sources are then localized by combining AF-DF probability and probable rotor regions.Type: ApplicationFiled: November 20, 2024Publication date: May 29, 2025Applicant: Tata Consultancy Services LimitedInventors: Oishee MAZUMDER, Aniruddha SINHA
-
Publication number: 20250173359Abstract: Systems and methods for identifying data labels for submitting to additional data labeling routines based on embedding clusters are described. For example, the system may retrieve an unlabeled dataset, wherein the unlabeled dataset comprises a plurality of unlabeled samples. The system may generate a plurality of embeddings based on the unlabeled dataset, wherein the plurality of embeddings comprises a respective embedding for each unlabeled sample in the plurality of unlabeled samples. The system may cluster the plurality of embeddings into a plurality of clusters. The system may, based on the first cluster, determine a first labeled sample of the first labeled dataset corresponding to the first cluster and determine to submit the first labeled sample to a second data labeling routine. The system may generate, using the second data labeling routine, a second labeled sample based on the first labeled sample.Type: ApplicationFiled: November 27, 2023Publication date: May 29, 2025Applicant: Capital One Services, LLCInventors: Joshua EDWARDS, Purva SHANKER, Jing ZHU, Zhuqing ZHANG, Nathan WOLFE, Ebony EDWARDS
-
Publication number: 20250173411Abstract: Systems and methods for providing variable and temporary access to account content for a user in a secured manner through the use of an access token with variable properties are described. The systems and methods provide improved navigability to account content accessed via the access token through the customization of user interfaces. For example, the system and methods may generate user interface templates that comprise a recommended selection and organization of user input fields and/or user interface pages.Type: ApplicationFiled: January 27, 2025Publication date: May 29, 2025Applicant: Capital One Services, LLCInventors: Lin Ni Lisa Cheng, Purva Shanker, Sara Margaret Hughes, Allison Trager, Shaun Kieran Webb
-
Publication number: 20250169709Abstract: The usage of microwave imaging for biomedical (BMWI) applications is still challenging due to the imprecise reconstruction of the relative permittivity of tissues and the ill-posed inverse scattering problem. Anomaly detection in biological tissues demand in-vivo, non-invasive, and non-contact measurements. Considering and proving the anomaly as a point object in the microwave imaging is erroneous and results in false implications about the anomaly's presence, location, and characteristics. Present disclosure provides systems and methods for anomaly detection in biological tissues. An intensity map of target region is generated to detect tumor. Area around the tumor is processed to obtain a refined image. As the tumor is embedded in tissues of higher dielectric constant, image thus formed is larger in size than actual tumor. An iterative numerical computation method is implemented to estimate relative permittivity.Type: ApplicationFiled: October 1, 2024Publication date: May 29, 2025Applicant: Tata Consultancy Services LimitedInventors: RAJ RAKSHIT, ANWESHA KHASNOBISH, ANNESHA MAZUMDER, ARIJIT CHOWDHURY, TAPAS CHAKRAVARTY
-
Publication number: 20250172052Abstract: In general, in one aspect, embodiments relate to an apparatus that includes a downhole tool, that includes one or more sealing elements that includes a bulk metallic glass (BMG) elastomer composite material.Type: ApplicationFiled: November 28, 2023Publication date: May 29, 2025Applicant: Halliburton Energy Services, Inc.Inventors: Shashwat Shukla, Somen Kumar Bhudolia, Sandeep Thatathil, Arpana Singh
-
Publication number: 20250175461Abstract: The exemplary embodiments described herein overcome problems encountered by conventional systems by providing an authenticated messaging environment in which a user can securely message with a programmatic intelligent agent. The user may be authenticated at the prompting of the programmatic intelligent agent, such as the beginning of a messaging session or when the user submits a request that requires access to sensitive or confidential information or requires access to a secure account. The prompt may take the form of a message sent from the programmatic intelligent agent. The message may contain a link for launching code, such as an application, that facilitates authentication of the user's identity. The user may activate the link to launch the code and then perform the steps requested by the code to perform the authentication.Type: ApplicationFiled: December 2, 2024Publication date: May 29, 2025Applicant: Capital One Services, LLCInventors: Rocky GUO, Jeffrey RULE, Lukiih CUAN, Gaurang BHATT
-
Publication number: 20250171284Abstract: An automation system uses cameras and sensors to identify a set of vehicle wheels within a lift area, then virtualizes the position and orientation of the vehicle relative to the lift posts. Lift arms extending from the lift posts are moved to a first position that places a profile camera near the predicted position of lift points, and image analysis is used to positively identify the lift points. The lift arms are then moved to a second position that places an adapter camera below the identified lift points, and image analysis is used to confirm safe positioning below the lift point. Captured images and feedback from image analysis are used to improve and refine the system's ability to identify wheels, profile view lift points, and plan view lift points. The system may be integrated with lift arms allowing for automated rotation, extension, and elevation of lift adapters.Type: ApplicationFiled: January 28, 2025Publication date: May 29, 2025Applicant: Vehicle Service Group, LLCInventors: Steven H. Taylor, Robert William Elliott, Gerry Lauderbaugh
-
Publication number: 20250175499Abstract: Even though serverless computing has advantages like lower cost, simplified scalability, simplified backend code and quicker turnaround, they have also given rise to a new form of cyber-attacks. Most of the conventional approaches are reactive based where steps are taken to control the aftereffects of an attack and preventive mechanism is of less focus. The present honeypot based approach for serverless cloud architecture, honeypots capture unauthorized users in order to provide security of the overall system. The honeypots redirect the attackers to a set of dummy nodes that form a random loop. Using a controlled time based loop, the attacker could be trapped for a maximum amount of time, thus penalizing the attacker by a negative award. It would result in exhaustion of resources and bandwidth of attacker. The present disclosure is also applicable to multi-cloud or hybrid cloud setup.Type: ApplicationFiled: September 27, 2024Publication date: May 29, 2025Applicant: Tata Consultancy Services LimitedInventors: Surabhi GARG, Meena SINGH DILIP THAKUR, Rajan Mindigal Alasingara BHATTACHAR, Sachin Premsukh LODHA
-
Publication number: 20250175468Abstract: Methods and systems are described herein for bypassing secondary tiers of authentication for particular security categories. An authentication system, when authenticating a user, may receive an authentication request with authentication data enabling authentication through a multi-tier authentication mechanism. When the request has been authenticated through a multi-tier authentication mechanism, the authentication system may identify a category associated with the request and generate a temporal unlock flag for that category of future requests, such that the temporal unlock flag indicates that multi-tier authentication is not required for a predetermined amount of time for requests of that category. The temporal unlock flag may be inserted into the user's record. When future requests of that same category are received, only a single-tier authentication mechanism may be required for authentication.Type: ApplicationFiled: January 27, 2025Publication date: May 29, 2025Applicant: Capital One Services, LLCInventors: Geeta Shyamala, Lee Adcock
-
Publication number: 20250175218Abstract: This disclosure relates generally to a composite reconfigurable intelligent surface system for real time beam steering and method thereof. Conventional method for real time beam steering includes bulky systems with several antenna elements and amplifiers to shape and control the beam. The present disclosure provides a composite reconfigurable intelligent surface (CRIS) for real time beam steering. The CRIS is formed from a set of constituent reflecting surfaces which in turn are generated from unit cells. These unit cells are responsible for providing individual phase reflection performance utilizing the installed varactor diode in each unit cell. The CRIS can provide a) multi-beam reflection performance, b) polarization sensitive operation, c) 2D beam steering abilities, d) real-time beam control, e) null point reduction for beam shaping requirements and f) dependable pattern stability over a suitable range of frequencies.Type: ApplicationFiled: October 1, 2024Publication date: May 29, 2025Applicant: Tata Consultancy Services LimitedInventors: AMARTYA BANERJEE, SOUMYA CHAKRAVARTY, TAPAS CHAKRAVARTY, ROWDRA GHATAK
-
Publication number: 20250171831Abstract: The present invention provides for novel methods for regulating and detecting the cytosine methylation status of DNA. The invention is based upon identification of a novel and surprising catalytic activity for the family of TET proteins, namely TET1, TET2, TET3, and CXXC4. The novel activity is related to the enzymes being capable of converting the cytosine nucleotide 5-methylcytosine into 5-hydroxymethylcytosine by hydroxylation.Type: ApplicationFiled: January 17, 2025Publication date: May 29, 2025Applicants: The Children's Medical Center Corporation, The United States of America, As Represented by the Secretary, Department of Health & Human ServicesInventors: Anjana Rao, Mamta Tahiliani, Kian Peng Koh, Suneet Agarwal, Aravind Iyer
-
Publication number: 20250173693Abstract: Disclosed herein are system, method, and computer program product embodiments for authenticating a mobile user via an authentication method determined based on a token level associated with the action being completed. An authentication token is created corresponding to the token level and the authentication token is sent to the mobile device. This authentication token may be used to authenticate subsequent actions and engage various services to complete the actions using application programming interfaces. The authentication token stored on the mobile device obviates the need for a user to authenticate multiple times to complete actions requiring a similar token level. The system may authenticate the identity of the mobile user using various authentication methods.Type: ApplicationFiled: December 2, 2024Publication date: May 29, 2025Applicant: Capital One Services, LLCInventors: Jeremy J. PHILLIPS, Mitchell MILLER, Saleem Ahmed SANGI
-
Publication number: 20250175331Abstract: A method includes receiving, from a second user device, an interaction message comprising an amount and a condition, and a witness. The method also includes verifying an identify of the second user device, and the interaction message by determining that the witness satisfies the condition. Responsive to verifying the interaction message, the method includes adjusting an online balance for the second user device, generating a response message that indicates that the interaction message was successfully evaluated and the amount was added to the online balance, and transmitting the response message to the second user device.Type: ApplicationFiled: January 22, 2025Publication date: May 29, 2025Applicant: Visa International Service AssociationInventors: Ranjit Kumaresan, Mahdi Zamani, Srinivasan Raghuraman, Mihai Christodorescu, Mohammad Mohsen Minaei Bidgoli
-
Publication number: 20250175395Abstract: Methods and systems for the dynamically re-clustering of nodes in clusters to provide optimal performance and/or the most efficient use of resources through the use of machine learning models. Specifically, the methods and systems may determine a cluster that optimally performs and/or has the most efficient use of resources based on a first machine learning model. The methods and system may then retrieve available substitute nodes from other domains and/or networks that may lie outside the cluster, but may nonetheless be available to, or accessed by the cluster. The methods and systems may then generate an additional plurality of clusters using one or more of the original nodes of the originally selected clusters and/or one or more of the available substitute nodes.Type: ApplicationFiled: January 27, 2025Publication date: May 29, 2025Applicant: Capital One Services, LLCInventors: Austin Walters, Mark Watson, Galen Rafferty, Jeremy Goodsitt
-
Patent number: 12312159Abstract: A bulk material container can include a body, having a plurality of side walls, a bottom, a cavity, and an opening, and a first engagement element. The plurality of side walls are coupled to the bottom, and the cavity, which is configured to receive a bulk material, is formed within the plurality of side walls and above the bottom. The opening is formed by the plurality of side walls spatially opposite of the bottom and is configured to discharge the bulk material when the container is at least partially inverted. The first engagement element can be configured to receive one or more prongs of a transportation device or a bulk material unloading device. In some embodiments, the container may also include a second engagement element and/or a third engagement element, for example with the first, second, and/or third engagement elements differing from each other.Type: GrantFiled: December 6, 2021Date of Patent: May 27, 2025Assignee: Halliburton Energy Services, Inc.Inventors: Wesley John Warren, Chad A. Fisher, Austin Carl Schaffner, Cameron Michael Kramer